SlideShare a Scribd company logo
1 of 10
CloudApplication
Architecture styles
Presented by
Nilay Shrivastava
Introduction
Success of any cloud application depend on the way it has deployed.
According to MicrosoftCloud application reference there are at
least 7 application architectures
1. N-tier architecture
2. Web-Queue-Worker architecture
3. Microservices
4. CQRS architecture
5. Event Driven architecture
6. Big data architecture
7. Big compute architecture
N-Tier
When to use
• Simple web application
• Migrating an on-premise
application to cloud with
minimum refactoring
• Hybrid Application i.e. unified
development of on-premises and
cloud applications
Benefits
Challenges
• Portability between cloud and
on-premises, and between
cloud platforms
• Less learning curves for most
developers
• Open to heterogeneous
environment
• Monolithic design prevents
independent deployment of
features
• Managing an IaaS application
is more work than an
application that uses only
managed services
• Difficult to manage network
security
Dividing applications in to logical layers and physical tiers
WebQueueWorkerArchitecture
When to use
Benefits
Challenges
• Applications with relatively
simple domain
• Applications with long running
workflows or batch applications
• When you want to use managed
services, rather than IaaS
• Relatively simple architecture
that is easy to understand
• Easy to deploy and manage
• The front end is decoupled from
the worker using asynchronous
messaging
• The front end and the worker
can be scaled independently
• Without careful design, the
front end and the worker can
become large, monolithic
components that are difficult to
maintain
• Hidden dependencies between
front end and the worker
Consists of a web front end that serves clients requests and a worker that performs resource intensive tasks
MicroservicesArchitecture
When to use
Benefits
Challenges
• Large applications that require
high release velocity
• Complex applications that need
to be highly scalable
• Applications rich domains or
many subdomains
• Organization with small
development teams
• Independent deployments
• Independent development
• Small focused team
• Fault isolation
• Mixed technology stacks
• Granular Scaling
• Complexity
• Lack of governance
• Network congestion and latency
• Data integrity
• Versioning
Small autonomous services implementing a dedicated business capability
CQRS architecture style
When to use Benefits
Challenges
• Use CQRS for collaborative
domains where many users access
the same data, especially when the
read and write workload are
asymmetrical
• CQRS is not a top level architecture
that applies to an entire system.
Apply CQRS only to those
subsystems where there is a clear
value in separating reads and writes
• Independent scaling
• Optimized data schemas
• Security
• Separations of concerns
• Simple Queries
• Complexity
• Messaging
• EventualConsistency
Separates read and write operations
Event driven architecture style
When to use
Benefits
Challenges
• Multiple subsystems must
process the same events
• Real time processing with
minimum time lag
• Complex event processing such
as pattern matching or
aggregation over time windows
• High volume and high velocity of
data, such as IoT
• Producers and consumers are
decoupled
• No point to point integrations,
it’s easy to add new consumers
to the system
• Consumers can respond to the
event immediately as they
arrive
• Highly scalable and distributed
• Guaranteed delivery
• Processing events in order and
exactly once
Event producers that generate a stream of events, and event consumers that listen for the events
Big data architecture style
When to use
Benefits
Challenges
• Batch processing of big data
sources at rest
• Real time processing of big
data in motion
• Interactive exploration of big
data
• Predictive analytics and
machine learning
• Performance through
parallelism
• Elastic Scale
• Interoperability with existing
solutions
• Technology choices
• Complexity
• Security
• Technology maturity
• Skillset
Ingestion processing and analysis of data that is too large or complex for traditional database
Big compute architecture style
When to use
Benefits
Challenges
• Simulation and number
crunching
• Long running computations
• Smaller computations that
must be run 100s or 1000s of
times
• High performance
• Solve large problems faster
• On-demand computing
• Managing theVM
infrastructure
• Managing volume of number
crunching
• Provisioning thousands of
cores in a timely manner
Large-scale workloads that require a large number of cores, often numbering in hundreds or thousands
Nilay Shrivastava
shrivastava.nilay@gmail.com
+91 93532 65476
ThankYou

More Related Content

What's hot

Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityNinh Nguyen
 
NIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference ArchitectureNIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference ArchitectureThanakrit Lersmethasakul
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computingPrince Chandu
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud ComputingImane SBAI
 
Cloud service lifecycle management
Cloud service lifecycle managementCloud service lifecycle management
Cloud service lifecycle managementAnimesh Chaturvedi
 
cloud computing:Types of virtualization
cloud computing:Types of virtualizationcloud computing:Types of virtualization
cloud computing:Types of virtualizationDr.Neeraj Kumar Pandey
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)Identacor
 
Server virtualization
Server virtualizationServer virtualization
Server virtualizationofsorganizer
 
Service-Oriented Architecture (SOA)
Service-Oriented Architecture (SOA)Service-Oriented Architecture (SOA)
Service-Oriented Architecture (SOA)WSO2
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesDheeraj Negi
 
Market oriented Cloud Computing
Market oriented Cloud ComputingMarket oriented Cloud Computing
Market oriented Cloud ComputingJithin Parakka
 

What's hot (20)

Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
 
NIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference ArchitectureNIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference Architecture
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud service lifecycle management
Cloud service lifecycle managementCloud service lifecycle management
Cloud service lifecycle management
 
cloud computing:Types of virtualization
cloud computing:Types of virtualizationcloud computing:Types of virtualization
cloud computing:Types of virtualization
 
Virtual machine security
Virtual machine securityVirtual machine security
Virtual machine security
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
Server virtualization
Server virtualizationServer virtualization
Server virtualization
 
Distributed information system
Distributed information systemDistributed information system
Distributed information system
 
Service-Oriented Architecture (SOA)
Service-Oriented Architecture (SOA)Service-Oriented Architecture (SOA)
Service-Oriented Architecture (SOA)
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Google App Engine
Google App EngineGoogle App Engine
Google App Engine
 
Introduction to Microsoft Azure Cloud
Introduction to Microsoft Azure CloudIntroduction to Microsoft Azure Cloud
Introduction to Microsoft Azure Cloud
 
Information Security Policies and Standards
Information Security Policies and StandardsInformation Security Policies and Standards
Information Security Policies and Standards
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
Market oriented Cloud Computing
Market oriented Cloud ComputingMarket oriented Cloud Computing
Market oriented Cloud Computing
 
Comet Cloud
Comet CloudComet Cloud
Comet Cloud
 

Similar to Cloud Application architecture styles

Serverless microservices
Serverless microservicesServerless microservices
Serverless microservicesLalit Kale
 
Alex Thissen (Xpirit) - Een verschuiving in architectuur: op weg naar microse...
Alex Thissen (Xpirit) - Een verschuiving in architectuur: op weg naar microse...Alex Thissen (Xpirit) - Een verschuiving in architectuur: op weg naar microse...
Alex Thissen (Xpirit) - Een verschuiving in architectuur: op weg naar microse...AFAS Software
 
Introductorytocomputing
IntroductorytocomputingIntroductorytocomputing
IntroductorytocomputingAnne Starr
 
Presentation cloud computing
Presentation cloud computingPresentation cloud computing
Presentation cloud computingAkash Pandey
 
Cloudtechnologyassociatepart 1
Cloudtechnologyassociatepart 1Cloudtechnologyassociatepart 1
Cloudtechnologyassociatepart 1Anne Starr
 
Introduction to Microservices
Introduction to MicroservicesIntroduction to Microservices
Introduction to MicroservicesMahmoudZidan41
 
CLOUD COMPUTING.ppt
CLOUD COMPUTING.pptCLOUD COMPUTING.ppt
CLOUD COMPUTING.pptDss
 
gkkCloudtechnologyassociate(cta)day 1
gkkCloudtechnologyassociate(cta)day 1gkkCloudtechnologyassociate(cta)day 1
gkkCloudtechnologyassociate(cta)day 1Anne Starr
 
Virtualization and cloud computing
Virtualization and cloud computingVirtualization and cloud computing
Virtualization and cloud computingDeep Gupta
 
Cloud Computing and Virtualization Overview by Amr Ali
Cloud Computing and Virtualization Overview by Amr AliCloud Computing and Virtualization Overview by Amr Ali
Cloud Computing and Virtualization Overview by Amr AliAmr Ali
 
Closer Look at Cloud Centric Architectures
Closer Look at Cloud Centric ArchitecturesCloser Look at Cloud Centric Architectures
Closer Look at Cloud Centric ArchitecturesTodd Kaplinger
 
The move-to-hybrid-cloud-itsmf-april2015
The move-to-hybrid-cloud-itsmf-april2015The move-to-hybrid-cloud-itsmf-april2015
The move-to-hybrid-cloud-itsmf-april2015Eduserv
 
Cloud computing and Service Platforms
Cloud computing and Service Platforms Cloud computing and Service Platforms
Cloud computing and Service Platforms Vibhawa Nirmal
 
Micro service session 1
Micro service   session 1Micro service   session 1
Micro service session 1Amin Arab
 
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak
 

Similar to Cloud Application architecture styles (20)

Serverless microservices
Serverless microservicesServerless microservices
Serverless microservices
 
Alex Thissen (Xpirit) - Een verschuiving in architectuur: op weg naar microse...
Alex Thissen (Xpirit) - Een verschuiving in architectuur: op weg naar microse...Alex Thissen (Xpirit) - Een verschuiving in architectuur: op weg naar microse...
Alex Thissen (Xpirit) - Een verschuiving in architectuur: op weg naar microse...
 
cloud computing
 cloud computing cloud computing
cloud computing
 
Introductorytocomputing
IntroductorytocomputingIntroductorytocomputing
Introductorytocomputing
 
Presentation cloud computing
Presentation cloud computingPresentation cloud computing
Presentation cloud computing
 
Cloudtechnologyassociatepart 1
Cloudtechnologyassociatepart 1Cloudtechnologyassociatepart 1
Cloudtechnologyassociatepart 1
 
Introduction to Microservices
Introduction to MicroservicesIntroduction to Microservices
Introduction to Microservices
 
CLOUD COMPUTING.ppt
CLOUD COMPUTING.pptCLOUD COMPUTING.ppt
CLOUD COMPUTING.ppt
 
gkkCloudtechnologyassociate(cta)day 1
gkkCloudtechnologyassociate(cta)day 1gkkCloudtechnologyassociate(cta)day 1
gkkCloudtechnologyassociate(cta)day 1
 
Virtualization and cloud computing
Virtualization and cloud computingVirtualization and cloud computing
Virtualization and cloud computing
 
Cloud Computing and Virtualization Overview by Amr Ali
Cloud Computing and Virtualization Overview by Amr AliCloud Computing and Virtualization Overview by Amr Ali
Cloud Computing and Virtualization Overview by Amr Ali
 
Closer Look at Cloud Centric Architectures
Closer Look at Cloud Centric ArchitecturesCloser Look at Cloud Centric Architectures
Closer Look at Cloud Centric Architectures
 
The move-to-hybrid-cloud-itsmf-april2015
The move-to-hybrid-cloud-itsmf-april2015The move-to-hybrid-cloud-itsmf-april2015
The move-to-hybrid-cloud-itsmf-april2015
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing Essentials in Alibaba Cloud
Cloud Computing Essentials in Alibaba CloudCloud Computing Essentials in Alibaba Cloud
Cloud Computing Essentials in Alibaba Cloud
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing and Service Platforms
Cloud computing and Service Platforms Cloud computing and Service Platforms
Cloud computing and Service Platforms
 
Micro service session 1
Micro service   session 1Micro service   session 1
Micro service session 1
 
Microservice intro
Microservice introMicroservice intro
Microservice intro
 
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
 

Recently uploaded

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 

Recently uploaded (20)

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 

Cloud Application architecture styles

  • 2. Introduction Success of any cloud application depend on the way it has deployed. According to MicrosoftCloud application reference there are at least 7 application architectures 1. N-tier architecture 2. Web-Queue-Worker architecture 3. Microservices 4. CQRS architecture 5. Event Driven architecture 6. Big data architecture 7. Big compute architecture
  • 3. N-Tier When to use • Simple web application • Migrating an on-premise application to cloud with minimum refactoring • Hybrid Application i.e. unified development of on-premises and cloud applications Benefits Challenges • Portability between cloud and on-premises, and between cloud platforms • Less learning curves for most developers • Open to heterogeneous environment • Monolithic design prevents independent deployment of features • Managing an IaaS application is more work than an application that uses only managed services • Difficult to manage network security Dividing applications in to logical layers and physical tiers
  • 4. WebQueueWorkerArchitecture When to use Benefits Challenges • Applications with relatively simple domain • Applications with long running workflows or batch applications • When you want to use managed services, rather than IaaS • Relatively simple architecture that is easy to understand • Easy to deploy and manage • The front end is decoupled from the worker using asynchronous messaging • The front end and the worker can be scaled independently • Without careful design, the front end and the worker can become large, monolithic components that are difficult to maintain • Hidden dependencies between front end and the worker Consists of a web front end that serves clients requests and a worker that performs resource intensive tasks
  • 5. MicroservicesArchitecture When to use Benefits Challenges • Large applications that require high release velocity • Complex applications that need to be highly scalable • Applications rich domains or many subdomains • Organization with small development teams • Independent deployments • Independent development • Small focused team • Fault isolation • Mixed technology stacks • Granular Scaling • Complexity • Lack of governance • Network congestion and latency • Data integrity • Versioning Small autonomous services implementing a dedicated business capability
  • 6. CQRS architecture style When to use Benefits Challenges • Use CQRS for collaborative domains where many users access the same data, especially when the read and write workload are asymmetrical • CQRS is not a top level architecture that applies to an entire system. Apply CQRS only to those subsystems where there is a clear value in separating reads and writes • Independent scaling • Optimized data schemas • Security • Separations of concerns • Simple Queries • Complexity • Messaging • EventualConsistency Separates read and write operations
  • 7. Event driven architecture style When to use Benefits Challenges • Multiple subsystems must process the same events • Real time processing with minimum time lag • Complex event processing such as pattern matching or aggregation over time windows • High volume and high velocity of data, such as IoT • Producers and consumers are decoupled • No point to point integrations, it’s easy to add new consumers to the system • Consumers can respond to the event immediately as they arrive • Highly scalable and distributed • Guaranteed delivery • Processing events in order and exactly once Event producers that generate a stream of events, and event consumers that listen for the events
  • 8. Big data architecture style When to use Benefits Challenges • Batch processing of big data sources at rest • Real time processing of big data in motion • Interactive exploration of big data • Predictive analytics and machine learning • Performance through parallelism • Elastic Scale • Interoperability with existing solutions • Technology choices • Complexity • Security • Technology maturity • Skillset Ingestion processing and analysis of data that is too large or complex for traditional database
  • 9. Big compute architecture style When to use Benefits Challenges • Simulation and number crunching • Long running computations • Smaller computations that must be run 100s or 1000s of times • High performance • Solve large problems faster • On-demand computing • Managing theVM infrastructure • Managing volume of number crunching • Provisioning thousands of cores in a timely manner Large-scale workloads that require a large number of cores, often numbering in hundreds or thousands